White Papers

Table Of Contents
Configuring the Hash Algorithm Seed...................................................................................................................317
Link Bundle Monitoring...................................................................................................................................................317
Managing ECMP Group Paths................................................................................................................................318
Creating an ECMP Group Bundle.......................................................................................................................... 318
Modifying the ECMP Group Threshold................................................................................................................ 318
RTAG7................................................................................................................................................................................ 319
Flow-based Hashing for ECMP................................................................................................................................... 320
Chapter 15: FIP Snooping.......................................................................................................... 323
Fibre Channel over Ethernet........................................................................................................................................ 323
Ensure Robustness in a Converged Ethernet Network.........................................................................................323
FIP Snooping on Ethernet Bridges..............................................................................................................................324
FIP Snooping in a Switch Stack.................................................................................................................................. 326
Using FIP Snooping........................................................................................................................................................ 326
FIP Snooping Prerequisites.....................................................................................................................................326
Important Points to Remember............................................................................................................................. 326
Enabling the FCoE Transit Feature.......................................................................................................................327
Enable FIP Snooping on VLANs............................................................................................................................. 327
Configure the FC-MAP Value................................................................................................................................ 328
Configure a Port for a Bridge-to-Bridge Link.....................................................................................................328
Configure a Port for a Bridge-to-FCF Link.........................................................................................................328
Impact on Other Software Features.................................................................................................................... 328
FIP Snooping Restrictions.......................................................................................................................................329
Configuring FIP Snooping....................................................................................................................................... 329
Displaying FIP Snooping Information..........................................................................................................................330
FCoE Transit Configuration Example......................................................................................................................... 335
Chapter 16: Flex Hash and Optimized Boot-Up...........................................................................337
Flex Hash Capability Overview.................................................................................................................................... 337
Configuring the Flex Hash Mechanism...................................................................................................................... 337
Configuring Fast Boot and LACP Fast Switchover................................................................................................ 338
Optimizing the Boot Time............................................................................................................................................. 338
Interoperation of Applications with Fast Boot and System States.....................................................................339
RDMA Over Converged Ethernet (RoCE) Overview............................................................................................. 342
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces................................................................................. 342
Chapter 17: FIPS Cryptography................................................................................................. 344
Configuration Tasks........................................................................................................................................................344
Preparing the System.................................................................................................................................................... 344
Enabling FIPS Mode....................................................................................................................................................... 344
Generating Host-Keys................................................................................................................................................... 345
Monitoring FIPS Mode Status..................................................................................................................................... 345
Disabling FIPS Mode...................................................................................................................................................... 345
Chapter 18: Force10 Resilient Ring Protocol (FRRP)..................................................................347
Protocol Overview.......................................................................................................................................................... 347
Ring Status................................................................................................................................................................. 348
Multiple FRRP Rings.................................................................................................................................................348
Important FRRP Points............................................................................................................................................349
10
Contents